(Page 6 of 10)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >

Category: System Security Management » Firewall

Added 2003-03-17
by Hisham Mardam Bey
yavipin-conf is a multiple client/server configuration utility for yavipin. It provides a parser, example configuration files, and a startup script which allows the user to start/stop/restart a VPN at any point. In syntax, the configuration is similar to that of vtun.

Server optimized Linux
Added 2003-03-17
by antitachyon
SoL (Server optimized Linux) is a Linux distribution completely independent from other Linux distributions. It was built from the original source packages and is optimized for heavy-duty server work. It contains all common server applications, and features XML boot and script technology that makes it easy to configure and make the server work.

Added 2003-02-13
by trollhunter project manager
trollhunter offers various tools to either analyze existing logfiles or monitor firewall activity in real time. Currently standard log messages generated by a Linux 2.4 kernel netfilter/iptables firewall are supported. You can choose from a Perl/Tk interface or run in commandline standard ASCII color TTY terminal.

Added 2002-12-16
by sabat
Firepoint Management Server works with fwbuilder to make a more complete iptables-based Linux firewall system. fwbuilder is a great GUI for creating iptables-based policy scripts, but in a production environment, you also need management services. Firepoint handles tasks like user logins (only one r/w user can be logged in at a time) and policy promotion.

Added 2002-08-27
by scudette
Reapoff (Regular Expression, Arbitrary Protocol, Opensource Filtering Firewall) is a regular expression enabled TCP/IP proxy. It operates on data using a pair of simple rule- based configuration files defining the tests and actions to perform on data. It can also sign SSL connections transparently (with MITM), applying a security policy to encrypted SSL sessions that would otherwise be allowed unchecked. The proxy forms the core part of an overall firewall solution designed to run from a RAM disk using Trinux.

Added 2002-07-31
by Michael C. Toren
tcptraceroute is a traceroute implementation using TCP SYN packets, instead of the more traditional UDP or ICMP ECHO packets. In doing so, it is able to trace through many common firewall filters.

Added 2002-07-23
by Pachyderm Firewall Management Software
Pachyderm is graphical firewall management software for ipchains. It is based on MySQL and PHP, easy to use, and has lots of configuration abilities.

Linux Firewall
Added 2002-07-23
by Scott Bartlett
Projectfiles.com Linux Firewall is a robust, well-designed firewall for Linux 2.4 based on netfilter/iptables. It supports advanced features for both servers and routers such as port forwarding and connection logging. It has verbose success and failure messages, and is easy to install and configure.

Network Access Control System
Added 2002-07-17
by Marc Schöchlin
NACS provides you a comfortable and secure way to provide untrusted computers access to your TCP/IP-based (v4) LAN/WAN. The system guarantees that only registered users are able to use network resources. In contrast to other solutions, like PPTP or IPsec, it is not necessary to install program-specific client software. The client machines only need a DHCP client (automated networkconfiguration) and an SSL capable Web browser. The server needs a 2.4 kernel, Jakarta-Tomcat Servlet Engine, JDK 1.3/JDK 1.4, Apache, MySQL, and firewall which secures your network in general. NACS gets its login and password data from a normal Linux-style passwd file. This implementation supports the integration of other authentication mechanisms (such as LDAP).

UIF - Userfriendly Iptables Frontend
Added 2002-05-27
by Jörg Platte
The Userfriendly Iptables Frontend is used to generate optimized iptables packet filter rules, using a simple description file specified by the user. Generated rules are provided in iptables- save style. UIF can be used to read or write rulesets to or from LDAP servers in your network, which provides a global storing mechanism. Its aim is to be an easy to configure, human readable packet filter.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus